Web Applications and Data Servers

فهرست مطالب کتاب Web Applications and Data Servers:

Part I: Introduction to Computer Network Security

Computer Network Fundamentals

Computer Network Security Fundamentals

Part II: Security Issues and Challenges in the Traditional Computer Network

Security Motives and Threats to Computer Networks

Introduction to Computer Network Vulnerabilities

Cyber Crimes and Hackers

Scripting and Security in Computer Networks and Web Browsers

Security Assessment, Analysis, and Assurance

Part III: Dealing with Computer Network Security Challenges

Disaster Management

Access Control and Authorization

Authentication

Cryptography

Part III: Dealing with Computer Network Security Challenges

Firewalls

System Intrusion Detection and Prevention

Computer and Network Forensics

Virus and Content Filtering

Standardization and Security Criteria: Security Evaluation of Computer Products

Computer Network Security Protocols

Security in Wireless Networks and Devices

Security in Sensor Networks

Other Efforts to Secure Data in Computer Networks

Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems

Cloud Computing and Related Security Issues

Virtualization Security

Mobile Systems and Corresponding Intractable Security Issues

Part V: Securing the Last Frontiers – The Home Front

Conquering the Last Frontier in the Digital Invasion: The Home Front

Part VI: Hands-on Projects

Projects

Web Development Essentials Version 1.0 English

فهرست مطالب کتاب Web Development Essentials Version 1.0 English:

TOPIC 031: SOFTWARE DEVELOPMENT AND WEB TECHNOLOGIES

1 Software Development Basic

2 Web Application Architecture

3 HTTP Basics

TOPIC 032: HTML DOCUMENT MARKUP

1 HTML Document Anatomy

2 HTML Semantics and Document Hierarchy

3 HTML References and Embedded Resources

4 HTML Forms

TOPIC 033: CSS CONTENT STYLING

1 CSS Basics

2 CSS Selectors and Style Application

3 CSS Styling

4 CSS Box Model and Layout

TOPIC 034: JAVASCRIPT PROGRAMMING

1 JavaScript Execution and Syntax

2 JavaScript Data Structures

3 JavaScript Control Structures and Functions

4 JavaScript Manipulation of Website Content and Styling

TOPIC 035: NODEJS SERVER PROGRAMMING

1 NodeJS Basics

2 NodeJS Express Basics

3 SQL Basics

Why Startups Fail: And How Yours Can Succeed

فهرست مطالب کتاب Why Startups Fail: And How Yours Can Succeed:

About the Author

Introduction

Part I—Market, Product, and Entrepreneur

Chapter 1: Poor Product-Market Fit

Chapter 2: Bad Products

Chapter 3: The Missing Entrepreneur

Part II—Sales and Marketing

Chapter 4: Investing in Sales and Marketing Too Early

Chapter 5: Losing Money on Every Sale

Chapter 6: Invisible Startups

Part III—Execution

Chapter 7: Failing to Communicate

Chapter 8: Not Getting Started

Chapter 9: Failing to Execute

Part IV—Capital and Liquidity

Chapter 10: Pitches That Fail

Chapter 11: Managing Liquidity

Chapter 12: From Failure, Success

Index

Windows Networking Troubleshooting

فهرست مطالب:

About the Authors

About the Technical Reviewer

Windows Troubleshooting Series

Chapter 1: Understanding Networks 1 Chapter 2: Managing Network Connections

Chapter 3: TCP/IP Networking

Chapter 4: What Causes Networking Problems

Chapter 5: Troubleshooting Networking 83 Chapter 6: Networking in a Virtual World

Chapter 7: Troubleshooting Mobile Worker and BYOD Networking Problems

Index

Windows Security Internals with PowerShell

فهرست مطالب کتاب Windows Security Internals with PowerShell:

Introduction

Chapter 1: Setting Up a PowerShell Testing Environment

PART I: An Overview of the Windows Operating System

Chapter 2: The Windows Kernel

Chapter 3: User-Mode Applications

PART II: The Windows Security Reference Monitor

Chapter 4: Security Access Tokens

Chapter 5: Security Descriptors

Chapter 6: Reading and Assigning Security Descriptors

Chapter 7: Access Checking

Chapter 8: Other Access Checking Use Cases

Chapter 9: Security Auditing

PART III: The Local Security Authority and Authentication

Chapter 10: Local Authentication

Chapter 11: Active Directory

Chapter 12: Interactive Authentication

Chapter 13: Network Authentication

Chapter 14: Kerberos Authentication

Chapter 15: Negotiate Authentication and Other Security Packages

Appendix A: Building a Windows Domain Network for Testing

Appendix B: SDDL SID Constants

Windows Server 2016 The Administrator’s Reference

فهرست مطالب کتاب Windows Server 2016 The Administrator’s Reference:

How to Use This Guide

Print Readers

Digital Book Readers

Support Information

Conventions & Features

Share & Stay in Touch

Chapter 1. Welcome to Windows Server 2016

Chapter 2. Working with Windows Servers

Chapter 3. Configuring Server Settings

Chapter 4. Understanding Active Directory Connecting Network Resources

Chapter 5. Managing Active Directory

Chapter 6. Maintaining Active Directory

Chapter 7. Accounts: The Essentials

Chapter 8. Managing Account Policies

Chapter 9. Creating Accounts

Chapter 10. Working with Managed Accounts

Chapter 11. Managing Computers, Users and Groups

Chapter 12. Maintaining Your Servers

Chapter 13. Optimizing Server Performance

Chapter 14. Using Group Policy

Chapter 15. Maintaining and Troubleshooting Group Policy

Chapter 16. Optimizing Server Security

Chapter 17. Deploying Windows Server 2016

Chapter 18. Implementing TCP/IP Networking

Chapter 19. Data Storage: The Essentials

Chapter 20. Partitioning and Optimizing Drives

Chapter 21. Using TPM and BitLocker Drive Encryption

Chapter 22. Using Storage Spaces

Chapter 23. Using RAID

Chapter 24. Maintaining Partitions and Drives

Chapter 25. Implementing File Sharing

Chapter 26. Using Shadow Copies and Work Folders

Chapter 27. Managing Permissions and Auditing

Chapter 28. Configuring Disk Quotas

Chapter 29. Using Group Policy for Administration

Chapter 30. Implementing Print Services

Chapter 31. Configuring and Maintaining Print Services

Chapter 32. Implementing DHCP

Chapter 33. Managing and Maintaining DHCP

Chapter 34. Implementing DNS

Chapter 35. Managing and Maintaining DNS

Index

Windows Server 2019 Administration Fundamentals, Second Edition A beginner’s guide to managing and administering Windows Server environments

فهرست مطالب کتاب Windows Server 2019 Administration Fundamentals:

Preface

Chapter 1: Getting started with Windows Server

Chapter 2: Introducing Windows Server 2019

Chapter 3: Installing Windows Server 2019

Chapter 4: Post-Installation Tasks in Windows Server 2019

Chapter 5: Directory Services in Windows Server 2019

Chapter 6: Adding Roles to Windows Server 2019

Chapter 7: Group Policy in Windows Server 2019

Chapter 8: Virtualization with Windows Server 2019

Chapter 9: Storing Data in Windows Server 2019

Chapter 10: Tuning and Maintaining Windows Server 2019

Chapter 11: Updating and Troubleshooting Windows Server 2019

Chapter 12: Preparing for the MTA 98-365 Exam

Index

Windows Server 2019 Inside Out

فهرست مطالب کتاب Windows Server 2019 Inside Out:

Chapter 1 Administration tools

Chapter 2 Installation options

Chapter 3 Deployment and configuration

Chapter 4 Active Directory

Chapter 5 DNS, DHCP, and IPAM

Chapter 6 Hyper-V

Chapter 7 Storage

Chapter 8 File servers

Chapter 9 Internet Information Services

Chapter 10 Containers

Chapter 11 Clustering and high availability

Chapter 12 Active Directory Certificate Services

Chapter 13 Active Directory Federation Services

Chapter 14 Dynamic Access Control and Active Directory Rights Management Services

Chapter 15 Routing and Remote Access

Chapter 16 Remote Desktop Services

Chapter 17 Azure IaaS and hybrid services

Chapter 18 Windows Subsystem for Linux

Chapter 19 Hardening Windows Server and Active Directory

Chapter 20 Security systems and services

Chapter 21 Maintenance and monitoring

Chapter 22 Upgrade and migration

Chapter 23 Troubleshooting

Index

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

فهرست مطالب کتاب Wireshark for Security Professionals:

Chapter1: Introducing Wireshark

Chapter 2: Setting Up the Lab

Chapter 3: The Fundamentals

Chapter 4: Capturing Packets

Chapter 5: Diagnosing Attacks

Chapter 6: Offensive Wireshark

Chapter 7: Decrypting TLS, Capturing USB, Keyloggers, and Network

Chapter 8: Scripting with Lua

Wireshark Network Analysis (Second Edition) The Official Wireshark Certified Network Analyst Study Guide

فهرست مطالب کتاب Wireshark Network Analysis (Second Edition):

Chapter 1: The World of Network Analysis

Chapter 2: Introduction to Wireshark

Chapter 3: Capture Traffic

Chapter 4: Create and Apply Capture Filters

Chapter 5: Define Global and Personal Preferences

Chapter 6: Colorize Traffic

Chapter 7: Define Time Values and Interpret Summaries

Chapter 8: Interpret Basic Trace File Statistics

Chapter 9: Create and Apply Display Filters

Chapter 10: Follow Streams and Reassemble Data

Chapter 11: Customize Wireshark Profiles

Chapter 12: Annotate, Save, Export and Print Packets

Chapter 13: Use Wireshark’s Expert System

Chapter 14: TCP/IP Analysis Overview

Chapter 15: Analyze Domain Name System (DNS) Traffic

Chapter 16: Analyze Address Resolution Protocol (ARP) Traffic

Chapter 17: Analyze Internet Protocol (IPv4/IPv6) Traffic

Chapter 18: Analyze Internet Control Message Protocol (ICMPv4/ICMPV6) Traffic

Chapter 19: Analyze User Datagram Protocol (UDP) Traffic

Chapter 20: Analyze Transmission Control Protocol (TCP) Traffic

Chapter 21: Graph IO Rates and TCP Trends

Chapter 22: Analyze Dynamic Host Configuration Protocol (DHCPv4/DHCPv6) Traffic

Chapter 23: Analyze Hypertext Transfer Protocol (HTTP) Traffic

Chapter 24: Analyze File Transfer Protocol (FTP) Traffic

Chapter 25: Analyze Email Traffic

Chapter 26: Introduction to 802.11 (WLAN) Analysis

Chapter 27: Introduction to Voice over IP (VoIP) Analysis

Chapter 28: Baseline “Normal” Traffic Patterns

Chapter 29: Find the Top Causes of Performance Problems

Chapter 30: Network Forensics Overview

Chapter 31: Detect Network Scanning and Discovery Processes

Chapter 32: Analyze Suspect Traffic

Chapter 33: Effective Use of Command Line Tools

Appendix A: Resources on the Book Website

All Access Pass Training Offer

 

Zabbix 7 IT Infrastructure Monitoring Cookbook Explore the New Features of Zabbix 7 for Designing, Building, and Maintaining Your Zabbix Setup

فهرست مطالب کتاب Zabbix 7 IT Infrastructure Monitoring Cookbook:

Chapter 1 Installing Zabbix and Getting Started Using the Frontend

Chapter 2 Getting Things Ready with Zabbix User Management

Chapter 3 Setting Up Zabbix Monitoring

Chapter 4 Working with Triggers and Alerts

Chapter 5 Building Your Own Structured Templates

Chapter 6 Visualizing Data, Inventory and Reporting

Chapter 7 Using Discovery for Automatic Creation

Chapter 8 Setting Up Zabbix Proxies

Chapter 9 Integrating Zabbix with External Services

Chapter 10 Extending Zabbix Functionality with Custom Scripts and Zabbix API

Chapter 11 Maintaining Your Zabbix Setup

Chapter 12 Advanced Zabbix Database Management

Chapter 13 Bringing Zabbix to the Cloud with Zabbix Cloud Integration

Zero to One: Notes on Startups, or How to Build the Future

فهرست مطالب کتاب Zero to One: Notes on Startups, or How to Build the Future:

1 The Challenge of the Future

2 Party Like It’s 1999

3 All Happy Companies Are Different

4 The Ideology of Competition

5 Last Mover Advantage

6 You Are Not a Lottery Ticket

7 Follow the Money

8 Secrets

9 Foundations

10 The Mechanics of Mafia

11 If You Build It, Will They Come?

12 Man and Machine

13 Seeing Green

14 The Founder’s Paradox